How to manage remediation of sophisticated threats
Scope of MUDCARP Attacks Highlight Third-Party Risk
A Chinese threat group is believed to have targeted the DoD supply chain, an iDefense report says.
Phishing Attacks Spiked by 250% in 2018
Microsoft’s new Security Intelligence Report reveals evolving tactics of hackers.
#RSAC: Rethinking Third-Party Risk Management
Orgs need to have their information security program in sync with their third-party vendors’
NTT Signs Deal to Acquire WhiteHat Security
NTT Security acquires WhiteHat Security to enhance end-to-end solutions.
Cybercrime Costs Firms $13m Each as Malicious Insider Threat Grows
Accenture and Verizon reports detail growing menace from within
Global Privacy Study Finds Firms Failing on Accountability
ICO warns that 15% have no incident response measures in place
FTSE 350 Boards Still Struggling with Cyber Awareness
Government report highlights progress but lack of maturity in several areas
Global Traffic Management for Cloud, Data Centers, and CDNs
Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be s…